who are we?

quintessence is a team specialized in cybersecurity, dedicated to detecting and responding effectively to its clients' vulnerabilities before they can be exploited by malicious actors.

we actively parcipitate in the cybersecurity community with contributions to open source projects, so far we have reported 15+ vulnerabilities to companies, 10+ secret leaks and we proactively reported multiple security incidents.

been contacted by us? read more about our mission and motivations here.
you can also discover an example audit report to understand our approach.


our accomplishments

- and other entities who wish to remain anonymous

our skills

audits

we conduct thorough audits of your codebase to find complex vulnerabilities, evaluating each component to ensure the resilience and security of your applications.

consulting

our team assists you in implementing tailored security strategies adapted to your sector. by working closely with your development teams, we establish preventive practices to minimize the risks of breaches and anticipate threats.

pentest

our intrusion testing experts simulate real attacks to test the robustness of your infrastructures against malicious actors. each penetration test is designed to reveal and remedy vulnerabilities before they can be exploited.

monitoring

we provide continuous monitoring of cybercriminal forums on the clear web and the dark web to quickly detect any malicious activity. this proactive surveillance allows us to optimize incident response and minimize the impact of attacks as much as possible.


our values

confidentiality

we guarantee confidentiality with encrypted communications via pgp and accept any confidentiality clauses you may propose.

transparency

we detail every minute of work and provide a daily report to ensure complete visibility of our actions.

security

all our emails are signed with pgp to prevent forgery. our audit reports are end-to-end encrypted, and we only store information essential for billing our clients. all our researchers use LUKS encrypted devices with the AES-256-XTS cipher.

access our public keys here

hacktivity

name description date
FToIfJ vulnerability reported
euZPRGAEV vulnerability reported
qPCP leaked secret reported
WwhPKzzkc vulnerability reported
Base for Music vulnerability reported
50inTech leaked secret reported
But public disclosure
Fleet leaked secret reported
hjllPsQqSrQ vulnerability reported
DhodE leaked secret reported
BULyPXWJYnLanYvl vulnerability reported
JkaOzWz vulnerability reported
QbYRfeO vulnerability reported
Blissim vulnerability reported
But vulnerability reported
Kidygo vulnerability reported
xJudF NPS: 9
YErwA audit report written
PcORw pentesting
CtetS vulnerability reported

follow us on bluesky / X